Return-Path: <vishwas.ietf@gmail.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix)
 with ESMTP id 8C77E21F8AA9 for <ipsec@ietfa.amsl.com>;
 Fri, 16 Nov 2012 09:49:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level: 
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[AWL=-0.300,
 BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_13=0.6, J_CHICKENPOX_14=0.6,
 RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com
 [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3x4CBV7LTT9h for
 <ipsec@ietfa.amsl.com>; Fri, 16 Nov 2012 09:49:37 -0800 (PST)
Received: from mail-la0-f44.google.com (mail-la0-f44.google.com
 [209.85.215.44]) by ietfa.amsl.com (Postfix) with ESMTP id 3E8D121F8A86 for
 <ipsec@ietf.org>; Fri, 16 Nov 2012 09:49:37 -0800 (PST)
Received: by mail-la0-f44.google.com with SMTP id d3so2453849lah.31 for
 <ipsec@ietf.org>; Fri, 16 Nov 2012 09:49:36 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=mime-version:in-reply-to:references:date:message-id:subject:from:to
 :cc:content-type; bh=/BdogOw24FAx1yns6dO2Bn5BJtgvaKWBN4mS41GpeGU=;
 b=xquucEjpwxBlJLNc3ztPCR8xDn0B7KNjBTgM5t+MJedHsLMGI1Kj3OPVvBSVQlgCw6
 XNW6r500qk7AdrxGFvm7ej61LbZrr02UtTTmHBzVm4jSWUWXD2doSoOWckuihDquwKzk
 glb856p84vM1buwuKCN/4iWAtEeyKgA8hbuvTZg9gzgR1j/GBtD2SfusUO8BpUIIYgmz
 7v2J5UD8dXc41GxDyUwWblGQQvbl3e2Pc757G71eNkw+4XtPhPtPTgzK+U6TZnWEwlvy
 mjE9ynWr/8cLnNTI/SZ7Ni4ty4vUOT9WUcZFG26IygqO2jEu60bLf4Iw5Vop/Ic7uZAg j7ew==
MIME-Version: 1.0
Received: by 10.152.133.140 with SMTP id pc12mr4870937lab.53.1353088176094;
 Fri, 16 Nov 2012 09:49:36 -0800 (PST)
Received: by 10.114.75.110 with HTTP; Fri, 16 Nov 2012 09:49:36 -0800 (PST)
In-Reply-To: <50A58CDB.30402@labn.net>
References: <50A5703F.4070305@labn.net>
 <CAOyVPHTWhv8=sP6kYkZmOEsjMsdr72P8fe=7w5XY0Hd_wP_9=w@mail.gmail.com>
 <50A58CDB.30402@labn.net>
Date: Fri, 16 Nov 2012 09:49:36 -0800
Message-ID: <CAOyVPHQ+n83DaVv6Q9Z0kvi0MyYrhPbB=L6ju4fwjTyRK1P22Q@mail.gmail.com>
From: Vishwas Manral <vishwas.ietf@gmail.com>
To: Lou Berger <lberger@labn.net>
Content-Type: multipart/alternative; boundary=f46d042dfe9915fe5204cea0644e
Cc: ipsec@ietf.org
Subject: Re: [IPsec] Some comments / questions on
 draft-ietf-ipsecme-ad-vpn-problem
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>,
 <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>,
 <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Nov 2012 17:49:38 -0000

--f46d042dfe9915fe5204cea0644e
Content-Type: text/plain; charset=ISO-8859-1

Hi Lou,

Thanks for the quick reply. Just a few comments prefixed with a "VM>":

>
> > We can add something in the lines of additional protocols are run over
> > the IPsec tunnels and the solution should make an effort to allow for
> > additional protocols like OSPF to be run optimally without too many
> > changes in configuration.
> >
> > Infact we have a requirement to the effect in section 4.1
>
> yes, this is what I referred to as 4.2 below, and suggested some
> replacement text...
>
> OK got it.

> >
> >     Gateways MUST allow tunnel binding, such that applications like
> >    Routing using the tunnels can work seamlessly without any updates to
> >    the higher level application configuration i.e.  OSPF configuration.
> >
> >     - In section 4.2, how about:
> >        (replacement text)
> >        3.  Gateways MUST allow for the operation of tunneling and
> >        routing protocols operating over spoke-to-spoke IPsec Tunnels
> >        with minimal, or no, configuration impact.
>
VM> Ok will specifically specify tunnels and routing protocols.


> >
> >
> >        X.  The solution SHOULD support BGP/MPLS IP VPNs, see [RFC4364].
> >
> >     If you want, you can make the "SHOULD" a "MUST", and "support" could
> be
> >     "be compatible with".
> >
> > I do not want to go ahead into details of what other routing solutions
> > it should support.
> >
> > With that said I am not sure what you mean by having BGP MPLS VPN in an
> > ADVPN scenario. BGP MPLS VPN is a provider provisioned VPN solution,
> > this is a customer provisioned one.
>
> Ahh, interesting point.  When I read the document I was looking to see
> if it was scoped purely to CE/customer based solutions.  Reading section
> 2 (intro) and 2.2, I saw no such restriction.  So I think section 2.2
> should be explicit on this point either way. Which is why I proposed the
> text "There is also the case when L3VPNs operate over IPsec Tunnels."
> (To explicitly include this case.)  If the WG wants this case excluded,
> that's fine too.
>
VM> It is not scoped purely as a CE device scenario, and after seeing your
comment I see no reason to leave that out of scope (though if I understand
your concern better I may feel otherwise). L3VPN can work over GRE tunnels/
L2TP tunnels, which can themselves use IPsec. Again in my view the L3VPN
and the IPsec VPN are 2 different layers in the stack if they run on the
same device. Do you see a reason to explicitly mention L3VPN in this case?

Thanks,
Vishwas


>
> > I see the 2 working in different
> > layers, and interacting only in edge gateways where both solutions have
> > an edge.
>
> Sure, but the problem exists for both.
>
> Thanks,
> Lou
> >
> >
> >     I also have a few more minor comments:
> >
> > I am ok with the minor suggestions you have.
> >
> > Thanks,
> > Vishwas
> >
> >
> >
> >     - In section 2.1, you introduce the term "NAT gateway" and then later
> >     use just "gateway" when I suspect you mean "NAT gateway".  I suggest
> >     using the term "NAT" and thereby not introduce possible confusion
> >     between the gateway term defined in section 1.1 and "NAT gateways".
> >
> >     - In section 2.2, s/occupies/requires
> >
> >     - In sections 2.2, and Section 3.2 you say dynamic addresses makes
> >     static configuration impossible.  This doesn't reflect the use of
> >     dynamic dns to handle this issues (and is currently supported by some
> >     vendors.)
> >
> >     Let me know what you think,
> >     Lou
> >     _______________________________________________
> >     IPsec mailing list
> >     IPsec@ietf.org <mailto:IPsec@ietf.org>
> >     https://www.ietf.org/mailman/listinfo/ipsec
> >
> >
> >
>

--f46d042dfe9915fe5204cea0644e
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Hi Lou,<br><br>Thanks for the quick reply. Just a few comments prefixed wit=
h a &quot;VM&gt;&quot;:<br><br><div class=3D"gmail_quote"><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex">
<div><div class=3D"h5">
&gt;<br>
&gt; We can add something in the lines of additional protocols are run over=
<br>
&gt; the IPsec tunnels and the solution should make an effort to allow for<=
br>
&gt; additional protocols like OSPF to be run optimally without too many<br=
>
&gt; changes in configuration.<br>
&gt;<br>
&gt; Infact we have a requirement to the effect in section 4.1<br>
<br>
</div></div>yes, this is what I referred to as 4.2 below, and suggested som=
e<br>
replacement text...<br>
<div class=3D"im"><br></div></blockquote><div>OK got it.=A0 <br></div><bloc=
kquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #cc=
c solid;padding-left:1ex"><div class=3D"im">
&gt;<br>
&gt; =A0 =A0 Gateways MUST allow tunnel binding, such that applications lik=
e<br>
&gt; =A0 =A0Routing using the tunnels can work seamlessly without any updat=
es to<br>
&gt; =A0 =A0the higher level application configuration i.e. =A0OSPF configu=
ration.<br>
&gt;<br>
&gt; =A0 =A0 - In section 4.2, how about:<br>
&gt; =A0 =A0 =A0 =A0(replacement text)<br>
&gt; =A0 =A0 =A0 =A03. =A0Gateways MUST allow for the operation of tunnelin=
g and<br>
&gt; =A0 =A0 =A0 =A0routing protocols operating over spoke-to-spoke IPsec T=
unnels<br>
&gt; =A0 =A0 =A0 =A0with minimal, or no, configuration impact.<br></div></b=
lockquote><div>VM&gt; Ok will specifically specify tunnels and routing prot=
ocols.<br>=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 =
0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
&gt;<br><div class=3D"im">
&gt;<br>
&gt; =A0 =A0 =A0 =A0X. =A0The solution SHOULD support BGP/MPLS IP VPNs, see=
 [RFC4364].<br>
&gt;<br>
&gt; =A0 =A0 If you want, you can make the &quot;SHOULD&quot; a &quot;MUST&=
quot;, and &quot;support&quot; could be<br>
&gt; =A0 =A0 &quot;be compatible with&quot;.<br>
&gt;<br>
&gt; I do not want to go ahead into details of what other routing solutions=
<br>
&gt; it should support.<br>
&gt;<br>
&gt; With that said I am not sure what you mean by having BGP MPLS VPN in a=
n<br>
&gt; ADVPN scenario. BGP MPLS VPN is a provider provisioned VPN solution,<b=
r>
&gt; this is a customer provisioned one.<br>
<br>
</div>Ahh, interesting point. =A0When I read the document I was looking to =
see<br>
if it was scoped purely to CE/customer based solutions. =A0Reading section<=
br>
2 (intro) and 2.2, I saw no such restriction. =A0So I think section 2.2<br>
should be explicit on this point either way. Which is why I proposed the<br=
>
text &quot;There is also the case when L3VPNs operate over IPsec Tunnels.&q=
uot;<br>
(To explicitly include this case.) =A0If the WG wants this case excluded,<b=
r>
that&#39;s fine too.<br></blockquote><div>VM&gt; It is not scoped purely as=
 a CE device scenario, and after seeing your comment I see no reason to lea=
ve that out of scope (though if I understand your concern better I may feel=
 otherwise). L3VPN can work over GRE tunnels/ L2TP tunnels, which can thems=
elves use IPsec. Again in my view the L3VPN and the IPsec VPN are 2 differe=
nt layers in the stack if they run on the same device. Do you see a reason =
to explicitly mention L3VPN in this case?<br>
<br>Thanks,<br>Vishwas<br>=A0<br></div><blockquote class=3D"gmail_quote" st=
yle=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div class=3D"im"><br>
&gt; I see the 2 working in different<br>
&gt; layers, and interacting only in edge gateways where both solutions hav=
e<br>
&gt; an edge.<br>
<br>
</div>Sure, but the problem exists for both.<br>
<br>
Thanks,<br>
Lou<br>
<div class=3D"im">&gt;<br>
&gt;<br>
&gt; =A0 =A0 I also have a few more minor comments:<br>
&gt;<br>
&gt; I am ok with the minor suggestions you have.<br>
&gt;<br>
&gt; Thanks,<br>
&gt; Vishwas<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt; =A0 =A0 - In section 2.1, you introduce the term &quot;NAT gateway&quo=
t; and then later<br>
&gt; =A0 =A0 use just &quot;gateway&quot; when I suspect you mean &quot;NAT=
 gateway&quot;. =A0I suggest<br>
&gt; =A0 =A0 using the term &quot;NAT&quot; and thereby not introduce possi=
ble confusion<br>
&gt; =A0 =A0 between the gateway term defined in section 1.1 and &quot;NAT =
gateways&quot;.<br>
&gt;<br>
&gt; =A0 =A0 - In section 2.2, s/occupies/requires<br>
&gt;<br>
&gt; =A0 =A0 - In sections 2.2, and Section 3.2 you say dynamic addresses m=
akes<br>
&gt; =A0 =A0 static configuration impossible. =A0This doesn&#39;t reflect t=
he use of<br>
&gt; =A0 =A0 dynamic dns to handle this issues (and is currently supported =
by some<br>
&gt; =A0 =A0 vendors.)<br>
&gt;<br>
&gt; =A0 =A0 Let me know what you think,<br>
&gt; =A0 =A0 Lou<br>
&gt; =A0 =A0 _______________________________________________<br>
&gt; =A0 =A0 IPsec mailing list<br>
</div>&gt; =A0 =A0 <a href=3D"mailto:IPsec@ietf.org">IPsec@ietf.org</a> &lt=
;mailto:<a href=3D"mailto:IPsec@ietf.org">IPsec@ietf.org</a>&gt;<br>
&gt; =A0 =A0 <a href=3D"https://www.ietf.org/mailman/listinfo/ipsec" target=
=3D"_blank">https://www.ietf.org/mailman/listinfo/ipsec</a><br>
&gt;<br>
&gt;<br>
&gt;<br>
</blockquote></div><br>

--f46d042dfe9915fe5204cea0644e--
